Tried another setup, this time after the initial setup, i just imported the SQL file and the site was fine with the old server data. Later on carefully checked and compared the differences in public, storage and config folder and moved data over to the new server (it was just the images) and cleared cache. Everything seems to be working fine as intended.

I have a snipe-it server (an old one, setup and upgraded through old versions to 4 now (4.1.0 build beta2). Had some issues and was unable to move forward to the latest version from that. I have around 700+ assets on it and wanted to setup a new server with latest version and migrate the data over to the new one.

I setup another CentOS7 version (i know that the common choice at ML now is Fedora, I need to test it out, but wanted to concentrate on snipe-it migration first to get it up and running on latest version). Installed snipe-it, went through the initial pre-flight configuration and got the first page on snipe-it. From there, i tried to use the SQL file from old server (which i got from the old server via admin panel backup, which has the sql file and 3 folders (storage, config & public). The moment i restore the db, and replace these 3 folders, the site starts showing the default Apache welcome page.

I thought it might be due to some configuration issues, and tried on a new setup again but this time used the snipeit.sh. All i did on the server was to install git and updated the server. Then ran snipeit.sh which did the rest (install apache, php 7.1, composer etc and setting up snipe-it) Got the site up and running, and again after restoring the old data back to the welcome page.

There's an array of protection being enforced in our endpoints and immediate plan even includes end user training. Am evaluating and trying to find the right product and my first choice as of now is to go with knowbe4 security awareness training. I believe, adding another later of protection is always good.

On our exchange level (o365), we have enabled attachment scanning on executables (we have advanced threat protection) as part of our package and we could see that some of our vendors attachments are now being blocked and identified as Trojans. We are still risk with getting files from usb and so thinking of providing a file sharing solution that has some sort of protection on that level as well

Good to see that clamav is available on next cloud. As mentioned in my original post, i would like to see more about the heuristic analysis, as most ransomware or zero day threats cant be detected by signature based security solution like an av. File cloud fits this part well even though I am not sure yet on how good that heuristics analysis is.

Another option i would like to explore is to have some sort of sandboxing or behavior analysis tool on local storage and use next cloud as a solution along with clamav engine

We have a requirement to setup a secure file sharing option to send and receive files between our employees and our external vendor. I am looking for a solution which enables file server, but along with that, some additional features which analyses the files for any threats. As i understand, the way products like box, one drive, Dropbox etc. works to protect against ransomware for example is to restore from previous version. This doesn't protect an end point from getting infected. We do have endpoint protection but still wanted to ensure the files we get from outside is also scanned.